]> git.ipfire.org Git - thirdparty/squid.git/blame - src/auth/ntlm/auth_ntlm.cc
Boilerplate: update copyright blurbs on src/
[thirdparty/squid.git] / src / auth / ntlm / auth_ntlm.cc
CommitLineData
94439e4e 1/*
bbc27441 2 * Copyright (C) 1996-2014 The Squid Software Foundation and contributors
94439e4e 3 *
bbc27441
AJ
4 * Squid software is distributed under GPLv2+ license and includes
5 * contributions from numerous individuals and organizations.
6 * Please see the COPYING and CONTRIBUTORS files for details.
94439e4e 7 */
8
bbc27441
AJ
9/* DEBUG: section 29 NTLM Authenticator */
10
94439e4e 11/* The functions in this file handle authentication.
12 * They DO NOT perform access control or auditing.
13 * See acl.c for access control and client_side.c for auditing */
14
582c2af2 15#include "squid.h"
3ad63615 16#include "auth/Gadgets.h"
5817ee13 17#include "auth/ntlm/auth_ntlm.h"
616cfc4c 18#include "auth/ntlm/Scheme.h"
aa110616 19#include "auth/ntlm/User.h"
616cfc4c 20#include "auth/ntlm/UserRequest.h"
928f3421 21#include "auth/State.h"
8a01b99e 22#include "cache_cf.h"
a46d2c0e 23#include "client_side.h"
a5bac1d2 24#include "HttpHeaderTools.h"
924f73bc 25#include "HttpReply.h"
a2ac85d9 26#include "HttpRequest.h"
602d9612 27#include "mgr/Registration.h"
cc192b50 28#include "SquidTime.h"
602d9612
A
29#include "Store.h"
30#include "wordlist.h"
c78aa667 31
94439e4e 32/* NTLM Scheme */
94439e4e 33static AUTHSSTATS authenticateNTLMStats;
94439e4e 34
928f3421 35statefulhelper *ntlmauthenticators = NULL;
94439e4e 36static int authntlm_initialised = 0;
37
94439e4e 38static hash_table *proxy_auth_cache = NULL;
39
40/*
41 *
42 * Private Functions
43 *
44 */
45
0bcb6908 46void
372fccd6 47Auth::Ntlm::Config::rotateHelpers()
0bcb6908
AJ
48{
49 /* schedule closure of existing helpers */
50 if (ntlmauthenticators) {
51 helperStatefulShutdown(ntlmauthenticators);
52 }
53
54 /* NP: dynamic helper restart will ensure they start up again as needed. */
55}
56
5817ee13 57/* free any allocated configuration details */
f5691f9c 58void
372fccd6 59Auth::Ntlm::Config::done()
94439e4e 60{
d4806c91
CT
61 Auth::Config::done();
62
94439e4e 63 authntlm_initialised = 0;
62e76326 64
5817ee13
AJ
65 if (ntlmauthenticators) {
66 helperStatefulShutdown(ntlmauthenticators);
5817ee13 67 }
62e76326 68
94439e4e 69 if (!shutting_down)
62e76326 70 return;
71
48d54e4d 72 delete ntlmauthenticators;
94439e4e 73 ntlmauthenticators = NULL;
62e76326 74
58ee2093
AJ
75 if (authenticateProgram)
76 wordlistDestroy(&authenticateProgram);
cdabe87d 77
372fccd6 78 debugs(29, DBG_IMPORTANT, "Reconfigure: NTLM authentication configuration cleared.");
94439e4e 79}
80
3616c90c
AJ
81bool
82Auth::Ntlm::Config::dump(StoreEntry * entry, const char *name, Auth::Config * scheme) const
94439e4e 83{
3616c90c
AJ
84 if (!Auth::Config::dump(entry, name, scheme))
85 return false;
62e76326 86
3616c90c
AJ
87 storeAppendPrintf(entry, "%s ntlm keep_alive %s\n", name, keep_alive ? "on" : "off");
88 return true;
94439e4e 89}
90
372fccd6 91Auth::Ntlm::Config::Config() : keep_alive(1)
6bf4f823 92{ }
62e76326 93
f5691f9c 94void
372fccd6 95Auth::Ntlm::Config::parse(Auth::Config * scheme, int n_configured, char *param_str)
f5691f9c 96{
a37d6070 97 if (strcmp(param_str, "program") == 0) {
58ee2093
AJ
98 if (authenticateProgram)
99 wordlistDestroy(&authenticateProgram);
62e76326 100
58ee2093 101 parse_wordlist(&authenticateProgram);
62e76326 102
58ee2093 103 requirePathnameExists("auth_param ntlm program", authenticateProgram->key);
a37d6070 104 } else if (strcmp(param_str, "keep_alive") == 0) {
6bf4f823 105 parse_onoff(&keep_alive);
d4806c91
CT
106 } else
107 Auth::Config::parse(scheme, n_configured, param_str);
94439e4e 108}
109
f5691f9c 110const char *
372fccd6 111Auth::Ntlm::Config::type() const
94439e4e 112{
d6374be6 113 return Auth::Ntlm::Scheme::GetInstance()->type();
94439e4e 114}
115
116/* Initialize helpers and the like for this auth scheme. Called AFTER parsing the
117 * config file */
f5691f9c 118void
372fccd6 119Auth::Ntlm::Config::init(Auth::Config * scheme)
94439e4e 120{
58ee2093 121 if (authenticateProgram) {
6bf4f823 122
62e76326 123 authntlm_initialised = 1;
124
125 if (ntlmauthenticators == NULL)
48d54e4d 126 ntlmauthenticators = new statefulhelper("ntlmauthenticator");
62e76326 127
128 if (!proxy_auth_cache)
30abd221 129 proxy_auth_cache = hash_create((HASHCMP *) strcmp, 7921, hash_string);
62e76326 130
131 assert(proxy_auth_cache);
132
58ee2093 133 ntlmauthenticators->cmdline = authenticateProgram;
62e76326 134
1af735c7 135 ntlmauthenticators->childs.updateLimits(authenticateChildren);
62e76326 136
137 ntlmauthenticators->ipc_type = IPC_STREAM;
138
62e76326 139 helperStatefulOpenServers(ntlmauthenticators);
94439e4e 140 }
141}
142
62ee09ca 143void
372fccd6 144Auth::Ntlm::Config::registerWithCacheManager(void)
62ee09ca 145{
8822ebee 146 Mgr::RegisterAction("ntlmauthenticator",
d9fc6862
A
147 "NTLM User Authenticator Stats",
148 authenticateNTLMStats, 0, 1);
62ee09ca 149}
150
f5691f9c 151bool
372fccd6 152Auth::Ntlm::Config::active() const
2d70df72 153{
f5691f9c 154 return authntlm_initialised == 1;
2d70df72 155}
156
f5691f9c 157bool
372fccd6 158Auth::Ntlm::Config::configured() const
94439e4e 159{
58ee2093 160 if ((authenticateProgram != NULL) && (authenticateChildren.n_max != 0)) {
372fccd6 161 debugs(29, 9, HERE << "returning configured");
f5691f9c 162 return true;
2d70df72 163 }
62e76326 164
372fccd6 165 debugs(29, 9, HERE << "returning unconfigured");
f5691f9c 166 return false;
94439e4e 167}
168
169/* NTLM Scheme */
94439e4e 170
f5691f9c 171void
c7baff40 172Auth::Ntlm::Config::fixHeader(Auth::UserRequest::Pointer auth_user_request, HttpReply *rep, http_hdr_type hdrType, HttpRequest * request)
94439e4e 173{
58ee2093 174 if (!authenticateProgram)
6bf4f823 175 return;
62e76326 176
63a05fa3 177 /* Need keep-alive */
450fe1cb 178 if (!request->flags.proxyKeepalive && request->flags.mustKeepalive)
26ac0430 179 return;
63a05fa3 180
6bf4f823 181 /* New request, no user details */
182 if (auth_user_request == NULL) {
372fccd6 183 debugs(29, 9, HERE << "Sending type:" << hdrType << " header: 'NTLM'");
18ec8500 184 httpHeaderPutStrf(&rep->header, hdrType, "NTLM");
6bf4f823 185
186 if (!keep_alive) {
62e76326 187 /* drop the connection */
e857372a 188 request->flags.proxyKeepalive = false;
62e76326 189 }
6bf4f823 190 } else {
c7baff40 191 Auth::Ntlm::UserRequest *ntlm_request = dynamic_cast<Auth::Ntlm::UserRequest *>(auth_user_request.getRaw());
3a11f20d 192 assert(ntlm_request != NULL);
193
d232141d 194 switch (ntlm_request->user()->credentials()) {
62e76326 195
d87154ee 196 case Auth::Failed:
6bf4f823 197 /* here it makes sense to drop the connection, as auth is
198 * tied to it, even if MAYBE the client could handle it - Kinkie */
e857372a 199 request->flags.proxyKeepalive = false;
6bf4f823 200 /* fall through */
94439e4e 201
d87154ee 202 case Auth::Ok:
6bf4f823 203 /* Special case: authentication finished OK but disallowed by ACL.
204 * Need to start over to give the client another chance.
205 */
206 /* fall through */
62e76326 207
d87154ee 208 case Auth::Unchecked:
6bf4f823 209 /* semantic change: do not drop the connection.
210 * 2.5 implementation used to keep it open - Kinkie */
372fccd6 211 debugs(29, 9, HERE << "Sending type:" << hdrType << " header: 'NTLM'");
18ec8500 212 httpHeaderPutStrf(&rep->header, hdrType, "NTLM");
6bf4f823 213 break;
62e76326 214
d87154ee 215 case Auth::Handshake:
6bf4f823 216 /* we're waiting for a response from the client. Pass it the blob */
372fccd6 217 debugs(29, 9, HERE << "Sending type:" << hdrType << " header: 'NTLM " << ntlm_request->server_blob << "'");
18ec8500 218 httpHeaderPutStrf(&rep->header, hdrType, "NTLM %s", ntlm_request->server_blob);
6bf4f823 219 safe_free(ntlm_request->server_blob);
220 break;
62e76326 221
6bf4f823 222 default:
372fccd6 223 debugs(29, DBG_CRITICAL, "NTLM Auth fixHeader: state " << ntlm_request->user()->credentials() << ".");
6bf4f823 224 fatal("unexpected state in AuthenticateNTLMFixErrorHeader.\n");
225 }
226 }
227}
62e76326 228
94439e4e 229static void
230authenticateNTLMStats(StoreEntry * sentry)
231{
9522b380 232 helperStatefulStats(sentry, ntlmauthenticators, "NTLM Authenticator Statistics");
94439e4e 233}
234
94439e4e 235/*
6bf4f823 236 * Decode a NTLM [Proxy-]Auth string, placing the results in the passed
94439e4e 237 * Auth_user structure.
238 */
c7baff40 239Auth::UserRequest::Pointer
d4806c91 240Auth::Ntlm::Config::decode(char const *proxy_auth, const char *aRequestRealm)
94439e4e 241{
d4806c91 242 Auth::Ntlm::User *newUser = new Auth::Ntlm::User(Auth::Config::Find("ntlm"), aRequestRealm);
c7baff40 243 Auth::UserRequest::Pointer auth_user_request = new Auth::Ntlm::UserRequest();
f5691f9c 244 assert(auth_user_request->user() == NULL);
a33a428a 245
f5691f9c 246 auth_user_request->user(newUser);
616cfc4c 247 auth_user_request->user()->auth_type = Auth::AUTH_NTLM;
94439e4e 248
249 /* all we have to do is identify that it's NTLM - the helper does the rest */
372fccd6 250 debugs(29, 9, HERE << "decode: NTLM authentication");
f5691f9c 251 return auth_user_request;
94439e4e 252}